con8811 converged identity governance for speeding up business and reducing cost final
DESCRIPTION
Sanjay Rallapally's OOw2013 presentationTRANSCRIPT
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.1
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.2
The following is intended to outline our general product direction. It is
intended for information purposes only, and may not be incorporated
into any contract. It is not a commitment to deliver any material, code,
or functionality, and should not be relied upon in making purchasing
decision. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole
discretion of Oracle.
Safe Harbor Statement
CON8811 Converged Identity Governance for speeding up business and reducing cost
Sanjay RallapallySr. Manager, Product Management
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.4
Program Agenda
Converged Identity Governance
Panel Discussion
Q & A
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.5
Market Trends
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.6
SIMPLIFY GETTING THE RIGHT ACCESS
STAYING IN COMPLIANCE
Business Problems
REDUCE FRAGMENTATION AND COST
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.7
The Right Approach is Self-Reinforcing
Reporting & Certification
Access Request
Provisioning
Remediation
Self-Reinfor
cing
VISIBILITY ACROSS COMPLETE USER ACCESS IS KEY
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.8
Identity GovernanceA Platform Approach
Provisioning and Reconciliation
Role and Policy Management
Access Request and Certification
Reporting and Analytics
Identity Administration
Reduce Risk
Improve Compliance
Simplify Access
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.9
Identity GovernanceBusiness-user friendly
Simplify access request using an Access Catalog
Allow users to request what others in their workgroup have
Empower approvers by enabling email-based approvals
Enforce security using digital signatures and re-authentication
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.10
Identity GovernanceSimple, yet Scalable architecture Onboard and manage the
lifecycle of millions ofidentities
Onboard 1000s ofapplications withoutexpensive Connectors
Onboard accounts and entitlements and manage their complete lifecycle
Shared workflows to accelerate request, fulfillment and Certification
Application On-boardingIdentity SynchronizationCatalog Management
Approval and ProvisioningWorkflows
Business Users
IT Administrators,Application Owners
AuthoritativeSources
LDAP ServersDatabases
ERP, MainframeCloud Applications
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.11
Identity GovernanceManage Regular and Privileged Access
Manage access to applicationsusing Access Request
Use break glass workflows to get emergency access
Leverage common Connectorsto manage privileged accountsand credentials
Leverage Access Certificationto ensure Compliance
Oracle Identity Governance
Unix Server Database Server
Return SYSTEM password
• User logs in as root• Adds disk space
User requests privilege to manage the server
User checks in passwords
User is granted privilege
User checks out the passwords
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.12
Identity GovernanceContinuous Compliance
Manage the lifecycle ofRoles and Policies
Carry out Role Miningto discover roles
Prevent violations usingSegregation of Duties
Implement AccessCertification
Address violations usingClosed-loop Remediation
Role Lifecycle Management
Policy Lifecycle Management
Segregation of Duties
Role Mining
Access Certification
Closed Loop Remediation
ReportingGovernance Analytics
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.13
Customer Panel Discussion
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.14
Customer Panel
Rich FleesQualcomm
Dariusz Spiewak
ZUS, Poland
Chris Commerford
Pfizer
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.15
Moscone South
Oracle Identity Governance Suite: Managing Privileged Accounts from Your Identity Platform
Come See Our Demo Pods
Moscone South
Identity Management Monitoring with Oracle Enterprise Manager
Moscone South
Oracle Identity Governance Suite: Complete Identity Lifecycle Management
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.16
IDM Sessions Not To MissMonday1.45 pm – 2:45 pm • CON8810: Who Should have Access to What: Better Risk Management
Identity GovernanceMoscone West, Room 2018
Tuesday10:30 am – 11:30am • CON8811: Converged Identity Governance for Speeding up Business
and Reducing CostMoscone West, Room 2018
Wednesday
1.15 pm – 2.15 pm • CON8828: Justifying and Planning a successful Identity Management Upgrade
Moscone West, Room 2018
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.17
Join the Oracle Community
Oracle.com/Identity
Twittertwitter.com/OracleIDM
Facebookfacebook.com/OracleIDM
Oracle Blogs
Blogs.oracle.com/OracleIDM
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.18
Oracle Fusion MiddlewareBusiness Innovation Platform for the Enterprise and Cloud
Complete and Integrated
Best-in-class
Open standards
On-premise and Cloud Foundation for Oracle Fusion
Applications and Oracle Cloud
User Engagement
Identity Management
Business Process
Management
Content Management
Business Intelligence
Service Integration Data Integration
Development Tools
Cloud Application Foundation
Enterprise Management
Web Social Mobile
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.19
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.20